Identity theft doesn't have to happen to you

Identity theft is a reoccurring problem in our increasingly online world, but that does not mean it's inevitable. Here is more information on how to prevent identity theft.

Susan Walsh/AP/File
This picture shows the exterior of the Internal Revenue Service (IRS) building in Washington (2013). The IRS issued $4 billion in fraudulent tax refunds last year to people using stolen identities, with some of the money going to addresses in Bulgaria, Lithuania and Ireland, according to a Treasury report released Thursday.

The world is changing quickly. Technological advancements give us access to all manner of information with the swipe of a finger. But the information revolution comes with costs, too: It is increasingly difficult to keep our financial (and non-financial) lives private.

Online databases, apps, spyware and cookies constantly collect and store data about all of us. This makes it possible to quickly find what we’re looking for on Google or Facebook, but it erodes our privacy as well.

The more we share, the more easily information can be gathered — and the more educated and aware we must become to protect ourselves.

Understanding your exposure

 According to Javelin Strategy and Research, an American becomes the victim of identity theft once every two seconds. That’s scary!

The first step to maintaining your privacy is to understand how your personal information or identity can become compromised. Let’s start, then, with the most common avenues of identity theft:

  • Financial: When someone runs up fraudulent charges on your credit or debit card, opens a bank account in your name, or uses your identity to get a loan or line of credit, it can create havoc on your credit report and with your credit score. This is the most prevalent type of identity theft.
  • Taxes: Identity thieves can use your information to file a tax return in your name and grab a refund, creating a nightmare for you when you file your own return. The IRS says tax fraud is one of the biggest issues facing the tax agency.
  • Medical: This occurs when someone uses your information to file false claims for insurance reimbursement. Not only is it a hassle to fix the problem, it can also lead to an incorrect medical diagnosis and unnecessary treatments.
  • Social Security: Someone who knows your Social Security number can inflict serious financial damage, opening accounts in your name.
  • Driver’s license: When your license is lost or stolen, someone could use it during traffic stops or other encounters, potentially getting you in a lot of trouble. If this happens, you’ll need to request a license number change.
  • Personal data: Big trouble can ensue when your email or social media accounts are compromised.

Safety tips

The recent news of hackers gaining access to the Social Security numbers, birth dates and addresses of federal employees underscores just how little control we have over data held by third parties that store sensitive data. But there is still much we can do to protect our privacy and prevent identity theft.

Some tips to help keep your information safe:

  • Update computers. Check that the security on your computers and mobile devices is current by regularly installing updates to your browsers, apps and saoftware.
  • Use strong passwords. Passwords such as “123456” or your birthday are weak and easily guessed. Use at least six characters and a mix of upper- and lowercase letters, numbers and characters. Do not store your password in a document on your computer. Instead, use a password manager (such as LastPass or Keeper) that is secure and can be accessed from any device.
  • Use two-step authentication when available. With this security measure, you receive a code in a text to your phone every time you log in to a bank account or other site. You must enter the code to gain access — so even if a crook knows your password, that person can’t access your account without having your phone in hand. Two-factor authentication is recommended for all financial accounts, cloud storage and even social media sites.
  • Protect mobile devices. Tablets and smartphones have the same security issues as computers. Use a reputable marketplace such as Apple’s iTunes Store or Google Play to download apps. Be careful with the permissions you allow on apps because they often track your location.
  • Never use public wi-fi. It’s not secure. Free, yes. Secure, no. Instead, create a virtual private network (VPN) of your own.
  • Freeze your credit. You can freeze your credit file at each reporting bureau. When your file is frozen, no one can see it unless you lift the freeze with a personal code. This can prevent someone from opening accounts in your name. Be aware that credit bureaus can charge a fee to place or lift a freeze.
  • Enroll in credit monitoring. You can request to be alerted to suspicious activity on your credit report.
  • Watch for encryption. When you must share sensitive information online, make sure the website has an address starting with “https” rather than just “http.” The “s” lets you know it is secure.
  • Protect cloud storage. Use a strong password and install two-step authentication to protect documents and files.

The work required to guard your personal information can seem overwhelming at first, but it’s worth tackling for peace of mind. For more information about protecting your identity online, computer security and other privacy best practices, check out resources fromNerdWallet, the Federal Trade Commission and others.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to

QR Code to Identity theft doesn't have to happen to you
Read this article in
QR Code to Subscription page
Start your subscription today